adobe CVE-2023-26369 is a vulnerability in Adobe
Published on September 13, 2023

Acrobat Reader versions 23.003.20284 (and earlier), 20.005.30516 (and earlier) and 20.005.30514 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Vendor Advisory NVD

Known Exploited Vulnerability

This Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Adobe Acrobat and Reader contains an out-of-bounds write vulnerability that allows for code execution.

The following remediation steps are recommended / required by October 5, 2023: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2023-26369 can be exploited with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 1.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.

What is a Memory Corruption Vulnerability?

The software writes data past the end, or before the beginning, of the intended buffer. Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.

CVE-2023-26369 has been classified to as a Memory Corruption vulnerability or weakness.


Products Associated with CVE-2023-26369

You can be notified by stack.watch whenever vulnerabilities like CVE-2023-26369 are published in these products:

 

What versions of are vulnerable to CVE-2023-26369?

Each of the following must match for the vulnerability to exist.